首页 > 最新文献

2011 Fifth International Conference on Secure Software Integration and Reliability Improvement最新文献

英文 中文
Towards a Reliable Spam-Proof Tagging System 迈向可靠的防垃圾邮件标签系统
Ennan Zhai, Liping Ding, S. Qing
Tagging systems are particularly vulnerable to tag spam. Although some previous efforts aim to address this problem with detection-based or demotion-based approaches, tricky attacks launched by attackers who can exploit vulnerabilities of spam-resistant mechanisms are still able to invalidate those efforts. Therefore, it is challenging to resist tricky spam attacks in tagging systems. This paper proposes a novel spam-proof tagging system, which can provide high-quality tag search results even under tricky attacks, based on four key insights: demotion-based strategy, reputation, altruistic users and social networking. Specifically, our system upgrades/degrades the ranks of correct/incorrect content items in search results through introducing personalized users' reliability degrees and responsible users, thus avoiding clients pick unwanted content. Experimental results illustrated our system could effectively defend against tricky tag spam attacks and work better than current prevalent tag search models.
标签系统特别容易受到标签垃圾邮件的攻击。尽管之前的一些努力旨在通过基于检测或基于降级的方法来解决这个问题,但攻击者可以利用抗垃圾邮件机制的漏洞发起的狡猾攻击仍然能够使这些努力无效。因此,在标签系统中抵抗棘手的垃圾邮件攻击是具有挑战性的。本文提出了一种新的防垃圾标签系统,该系统基于四个关键的见解:基于降级的策略、声誉、利他用户和社交网络,即使在狡猾的攻击下也能提供高质量的标签搜索结果。具体来说,我们的系统通过引入个性化用户的可靠度和负责任的用户来提升/降低搜索结果中正确/不正确内容的等级,从而避免客户端选择不需要的内容。实验结果表明,我们的系统可以有效地防御棘手的标签垃圾攻击,并且比当前流行的标签搜索模型更好。
{"title":"Towards a Reliable Spam-Proof Tagging System","authors":"Ennan Zhai, Liping Ding, S. Qing","doi":"10.1109/SSIRI.2011.30","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.30","url":null,"abstract":"Tagging systems are particularly vulnerable to tag spam. Although some previous efforts aim to address this problem with detection-based or demotion-based approaches, tricky attacks launched by attackers who can exploit vulnerabilities of spam-resistant mechanisms are still able to invalidate those efforts. Therefore, it is challenging to resist tricky spam attacks in tagging systems. This paper proposes a novel spam-proof tagging system, which can provide high-quality tag search results even under tricky attacks, based on four key insights: demotion-based strategy, reputation, altruistic users and social networking. Specifically, our system upgrades/degrades the ranks of correct/incorrect content items in search results through introducing personalized users' reliability degrees and responsible users, thus avoiding clients pick unwanted content. Experimental results illustrated our system could effectively defend against tricky tag spam attacks and work better than current prevalent tag search models.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131774667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study 在工业案例研究中应用PREDIQT方法的经验评价
Aida Omerovic, Bjørnar Solhaug, K. Stølen
We have developed a method called PREDIQT for model-based prediction of impacts of architectural design changes on system quality. A recent case study indicated feasibility of the PREDIQT method when applied on a real-life industrial system. This paper reports on the experiences from applying the PREDIQT method in a second and more recent case study -- on an industrial ICT system from another domain and with a number of different system characteristics, compared with the previous case study. The analysis is performed in a fully realistic setting. The system analyzed is a critical and complex expert system used for management and support of numerous working processes. The system is subject to frequent changes of varying type and extent. The objective of the case study has been to perform an additional and more structured evaluation of the PREDIQT method and assess its performance with respect to a set of success criteria. The evaluation argues for feasibility and usefulness of the PREDIQT-based analysis. Moreover, the study has provided useful insights into the weaknesses of the method and suggested directions for future research and improvements.
我们开发了一种称为PREDIQT的方法,用于基于模型的预测架构设计变更对系统质量的影响。最近的一个案例研究表明,PREDIQT方法在实际工业系统中的应用是可行的。本文报告了在第二个也是最近的案例研究中应用PREDIQT方法的经验,该案例研究是来自另一个领域的工业ICT系统,与之前的案例研究相比,具有许多不同的系统特征。分析是在一个完全真实的环境中进行的。所分析的系统是一个关键而复杂的专家系统,用于管理和支持众多工作流程。该系统经常发生不同类型和程度的变化。案例研究的目的是对PREDIQT方法进行额外的和更结构化的评估,并根据一套成功标准评估其表现。评价论证了基于prediqt分析的可行性和有效性。此外,本研究对该方法的不足之处提供了有益的见解,并为未来的研究和改进提出了方向。
{"title":"Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study","authors":"Aida Omerovic, Bjørnar Solhaug, K. Stølen","doi":"10.1109/SSIRI.2011.20","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.20","url":null,"abstract":"We have developed a method called PREDIQT for model-based prediction of impacts of architectural design changes on system quality. A recent case study indicated feasibility of the PREDIQT method when applied on a real-life industrial system. This paper reports on the experiences from applying the PREDIQT method in a second and more recent case study -- on an industrial ICT system from another domain and with a number of different system characteristics, compared with the previous case study. The analysis is performed in a fully realistic setting. The system analyzed is a critical and complex expert system used for management and support of numerous working processes. The system is subject to frequent changes of varying type and extent. The objective of the case study has been to perform an additional and more structured evaluation of the PREDIQT method and assess its performance with respect to a set of success criteria. The evaluation argues for feasibility and usefulness of the PREDIQT-based analysis. Moreover, the study has provided useful insights into the weaknesses of the method and suggested directions for future research and improvements.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115362676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Trust Observations in Validation Exercises 验证练习中的信任观察
F. Amato, M. Felici, Paola Lanzi, Giulia Lotti, L. Save, A. Tedeschi
This paper is concerned with an operational account of trust. It reports our experience in observing different trust aspects during a validation session for the assessment of a new tool and relevant operational concepts in the Air Traffic Management (ATM) domain. Despite the fact that trust is yet an elusive concept, our results show how monitoring trust can support the validation of alternative system settings and their operational aspects. This paper reports our experimental work on observing trust during validations exercises. Moreover, it provides new insights about the nature and the investigation of trust.
本文关注的是一个可操作的信任账户。它报告了我们在评估空中交通管理(ATM)领域的新工具和相关操作概念的验证会话期间观察不同信任方面的经验。尽管信任仍然是一个难以捉摸的概念,但我们的研究结果显示了如何监控信任可以支持替代系统设置及其操作方面的验证。本文报告了我们在验证练习中观察信任的实验工作。此外,它还提供了关于信任的性质和调查的新见解。
{"title":"Trust Observations in Validation Exercises","authors":"F. Amato, M. Felici, Paola Lanzi, Giulia Lotti, L. Save, A. Tedeschi","doi":"10.1109/SSIRI.2011.26","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.26","url":null,"abstract":"This paper is concerned with an operational account of trust. It reports our experience in observing different trust aspects during a validation session for the assessment of a new tool and relevant operational concepts in the Air Traffic Management (ATM) domain. Despite the fact that trust is yet an elusive concept, our results show how monitoring trust can support the validation of alternative system settings and their operational aspects. This paper reports our experimental work on observing trust during validations exercises. Moreover, it provides new insights about the nature and the investigation of trust.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126480686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Component-Based Malicious Software Engineer Intrusion Detection 基于组件的恶意软件工程入侵检测
M. Shin, Snehadeep Sethia, N. Patel
These days, security-sensitive business application systems are developed and maintained by more than one software engineer, some of which may be unethical or malicious. Unethical software engineers can insert malicious code to the systems or maliciously change the existing code in the systems to gain personal benefits. As the result, security of the business application systems can be compromised. This paper describes an approach to detecting malicious code created by malicious software engineers in components. This paper is an extension to our previous work detecting malicious code attacking security-sensitive information within a component. In particular, this paper focuses on detecting malicious code in a component that intrudes security-sensitive information in different components in an application. For this, an application system monitor(s) is designed to detect intrusion between components using the business process encapsulated in the monitor(s). The proposed approach is applied to the ATM system and B2B electronic commerce system to evaluate the performance.
如今,对安全敏感的业务应用程序系统由多个软件工程师开发和维护,其中一些可能是不道德的或恶意的。不道德的软件工程师可以在系统中插入恶意代码或恶意更改系统中的现有代码以获取个人利益。因此,业务应用程序系统的安全性可能会受到损害。本文描述了一种检测恶意软件工程师在组件中编写的恶意代码的方法。本文是我们之前工作的扩展,检测攻击组件中安全敏感信息的恶意代码。特别地,本文着重于检测一个组件中的恶意代码,这些恶意代码侵入了应用程序中不同组件中的安全敏感信息。为此,应用程序系统监视器被设计为使用封装在监视器中的业务流程检测组件之间的入侵。将该方法应用于ATM系统和B2B电子商务系统的性能评估。
{"title":"Component-Based Malicious Software Engineer Intrusion Detection","authors":"M. Shin, Snehadeep Sethia, N. Patel","doi":"10.1109/SSIRI.2011.33","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.33","url":null,"abstract":"These days, security-sensitive business application systems are developed and maintained by more than one software engineer, some of which may be unethical or malicious. Unethical software engineers can insert malicious code to the systems or maliciously change the existing code in the systems to gain personal benefits. As the result, security of the business application systems can be compromised. This paper describes an approach to detecting malicious code created by malicious software engineers in components. This paper is an extension to our previous work detecting malicious code attacking security-sensitive information within a component. In particular, this paper focuses on detecting malicious code in a component that intrudes security-sensitive information in different components in an application. For this, an application system monitor(s) is designed to detect intrusion between components using the business process encapsulated in the monitor(s). The proposed approach is applied to the ATM system and B2B electronic commerce system to evaluate the performance.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121214927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On Testing Effectiveness of Metamorphic Relations: A Case Study 关于变质关系检验有效性的实例研究
M. Asrafi, Huai Liu, Fei-Ching Kuo
One fundamental challenge for software testing is the oracle problem, which means that either there does not exist a mechanism (called oracle) to verify the test output given any possible program input, or it is very expensive, if not impossible, to apply the oracle. Metamorphic testing is an innovative approach to oracle problem. In metamorphic testing, metamorphic relations are derived from the innate characteristics of the software under test. These relations can help to generate test data and verify the correctness of the test result without the need of oracle. The effectiveness of metamorphic relations can play a significant role in the testing process. It has been argued that the metamorphic relations that cause different software execution behaviors should have high fault detection ability. In this paper, we conduct a case study to analyze the relationship between the execution behavior and the fault-detection effectiveness of metamorphic relations. Some code coverage criteria are used to reflect the execution behavior. It is shown that there is a certain degree of correlation between the code coverage achieved by a metamorphic relation and its fault-detection effectiveness.
软件测试的一个基本挑战是oracle问题,这意味着要么不存在一种机制(称为oracle)来验证给定任何可能的程序输入的测试输出,要么应用oracle非常昂贵(如果不是不可能的话)。变形测试是解决oracle问题的一种创新方法。在变形测试中,变形关系是从被测软件的固有特征中派生出来的。这些关系可以在不需要oracle的情况下生成测试数据并验证测试结果的正确性。变质关系的有效性在测试过程中起着重要的作用。引起不同软件执行行为的变形关系应具有较高的故障检测能力。本文通过实例分析了变形关系的执行行为与故障检测有效性之间的关系。一些代码覆盖标准被用来反映执行行为。结果表明,变质关系所获得的代码覆盖率与其故障检测效率之间存在一定的相关性。
{"title":"On Testing Effectiveness of Metamorphic Relations: A Case Study","authors":"M. Asrafi, Huai Liu, Fei-Ching Kuo","doi":"10.1109/SSIRI.2011.21","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.21","url":null,"abstract":"One fundamental challenge for software testing is the oracle problem, which means that either there does not exist a mechanism (called oracle) to verify the test output given any possible program input, or it is very expensive, if not impossible, to apply the oracle. Metamorphic testing is an innovative approach to oracle problem. In metamorphic testing, metamorphic relations are derived from the innate characteristics of the software under test. These relations can help to generate test data and verify the correctness of the test result without the need of oracle. The effectiveness of metamorphic relations can play a significant role in the testing process. It has been argued that the metamorphic relations that cause different software execution behaviors should have high fault detection ability. In this paper, we conduct a case study to analyze the relationship between the execution behavior and the fault-detection effectiveness of metamorphic relations. Some code coverage criteria are used to reflect the execution behavior. It is shown that there is a certain degree of correlation between the code coverage achieved by a metamorphic relation and its fault-detection effectiveness.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131556670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
An Organization-Driven Approach for Enterprise Security Development and Management 企业安全开发与管理的组织驱动方法
Lirong Dai, Yan Bai
Enterprises security is a complex problem. Pure technology-driven development methods are not sufficient to solve a broad range of enterprise security issues. This paper analyzes the complexity of enterprise security and proposes an organization-driven approach for the problem. The approach combines a set of Unified Modeling Language-based approaches to bridge the gap between enterprise security architecture models and security application development models. It allows an enterprise to coordinate security resources from an enterprise point of view, and develop security applications systematically and efficiently. A comprehensive case study is conducted to illustrate the approach. The study shows through the refinement of enterprise security goals, both software goals and software requirements for a security application can be obtained. In particular, a security application is built to support the specification and automated verification of separation of duty access policies using the Object Constraint Language and formal method Alloy.
企业安全是一个复杂的问题。纯技术驱动的开发方法不足以解决广泛的企业安全问题。本文分析了企业安全的复杂性,提出了一种组织驱动的方法。该方法结合了一组基于统一建模语言的方法,以弥合企业安全体系结构模型和安全应用程序开发模型之间的差距。它允许企业从企业的角度协调安全资源,系统、高效地开发安全应用程序。通过一个全面的案例研究来说明该方法。研究表明,通过细化企业安全目标,可以获得安全应用程序的软件目标和软件需求。特别地,构建了一个安全应用程序,以支持使用对象约束语言和形式方法Alloy的职责分离访问策略的规范和自动验证。
{"title":"An Organization-Driven Approach for Enterprise Security Development and Management","authors":"Lirong Dai, Yan Bai","doi":"10.1109/SSIRI.2011.25","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.25","url":null,"abstract":"Enterprises security is a complex problem. Pure technology-driven development methods are not sufficient to solve a broad range of enterprise security issues. This paper analyzes the complexity of enterprise security and proposes an organization-driven approach for the problem. The approach combines a set of Unified Modeling Language-based approaches to bridge the gap between enterprise security architecture models and security application development models. It allows an enterprise to coordinate security resources from an enterprise point of view, and develop security applications systematically and efficiently. A comprehensive case study is conducted to illustrate the approach. The study shows through the refinement of enterprise security goals, both software goals and software requirements for a security application can be obtained. In particular, a security application is built to support the specification and automated verification of separation of duty access policies using the Object Constraint Language and formal method Alloy.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134226044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RELEASE: Generating Exploits Using Loop-Aware Concolic Execution 释放:使用循环感知的Concolic执行生成漏洞
Bing-Han Li, S. Shieh
Automatically finding vulnerabilities and even generating exploits are desirable for software testing. For the protection of intellectual property and copyright, programs being tested may be lack of source code and symbol table information. Concolic execution is a novel technique, which takes advantage of the rapid executing speed of concrete execution and the wide testing coverage of symbolic execution, to discover and identify software bugs, including vulnerabilities. However, a serious limitation of concolic execution inherited from symbolic execution is its poor analysis result with loops, a common programming construct. For instance, when the number of iterations depends on the inputs, the analysis cannot determine possible execution paths of the program. In this paper, we propose a new concolic execution technique, loop-aware concolic execution, for testing software and analyzing loop-related variables with fewer execution steps. With the novel technique, not only linear relations but also some polynomial recurrence relations in a loop can be handled. To demonstrate effectiveness of the novel technique, we developed a concolic analyzer, called RELEASE, to discover buffer-overflow vulnerabilities in the testing benchmarks.
软件测试需要自动发现漏洞,甚至生成漏洞。为了保护知识产权和版权,被测试的程序可能缺少源代码和符号表信息。集合执行是一种利用具体执行的快速执行速度和符号执行的广泛测试覆盖率来发现和识别包括漏洞在内的软件缺陷的新技术。然而,集合执行继承自符号执行的一个严重限制是它对循环(一种常见的编程结构)的分析结果很差。例如,当迭代次数依赖于输入时,分析无法确定程序的可能执行路径。在本文中,我们提出了一种新的循环执行技术——循环感知的循环执行,以较少的执行步骤测试软件和分析与循环相关的变量。该方法不仅可以处理线性关系,还可以处理一些多项式递归关系。为了证明这种新技术的有效性,我们开发了一个名为RELEASE的concolic分析器,用于在测试基准中发现缓冲区溢出漏洞。
{"title":"RELEASE: Generating Exploits Using Loop-Aware Concolic Execution","authors":"Bing-Han Li, S. Shieh","doi":"10.1109/SSIRI.2011.31","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.31","url":null,"abstract":"Automatically finding vulnerabilities and even generating exploits are desirable for software testing. For the protection of intellectual property and copyright, programs being tested may be lack of source code and symbol table information. Concolic execution is a novel technique, which takes advantage of the rapid executing speed of concrete execution and the wide testing coverage of symbolic execution, to discover and identify software bugs, including vulnerabilities. However, a serious limitation of concolic execution inherited from symbolic execution is its poor analysis result with loops, a common programming construct. For instance, when the number of iterations depends on the inputs, the analysis cannot determine possible execution paths of the program. In this paper, we propose a new concolic execution technique, loop-aware concolic execution, for testing software and analyzing loop-related variables with fewer execution steps. With the novel technique, not only linear relations but also some polynomial recurrence relations in a loop can be handled. To demonstrate effectiveness of the novel technique, we developed a concolic analyzer, called RELEASE, to discover buffer-overflow vulnerabilities in the testing benchmarks.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121211386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Model-Driven Monitoring of Time-Critical Systems Based on Aspect-Oriented Programming 基于面向方面编程的时间关键系统模型驱动监控
Ki-Seong Lee, Chan-Gun Lee
Temporal correctness is one of the most important requirements for time-critical systems. Although time-critical systems are designed to meet their timing constraints, there can be still errors especially with timing constraints in run-time due to various reasons. Typically, time-critical systems are shipped with run-time monitors to check their temporal requirements. Hence, run-time monitors are essential to time-critical services. In this paper, we propose a model-driven monitor based on AOP for time-critical systems. The monitor is modeled by using xUML in the design time, and its timing constrains are specified by RTL-like expressions. The designed monitor model is transformed into the code automatically by our proposed tool chain. We validate the effectiveness of our approach by presenting a case study and analyzing the implemented system.
时间正确性是时间关键型系统最重要的需求之一。尽管时间关键型系统的设计是为了满足它们的时间约束,但由于各种原因,在运行时仍然可能出现错误,特别是在时间约束方面。通常,时间关键型系统附带运行时监视器,以检查它们的时间需求。因此,运行时监视器对于时间关键型服务至关重要。本文提出了一种基于AOP的模型驱动监控系统。监控器在设计时使用xUML建模,其时序约束由类似rtl的表达式指定。设计的监控模型通过我们提出的工具链自动转换为代码。我们通过展示一个案例研究和分析实现的系统来验证我们方法的有效性。
{"title":"Model-Driven Monitoring of Time-Critical Systems Based on Aspect-Oriented Programming","authors":"Ki-Seong Lee, Chan-Gun Lee","doi":"10.1109/SSIRI.2011.15","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.15","url":null,"abstract":"Temporal correctness is one of the most important requirements for time-critical systems. Although time-critical systems are designed to meet their timing constraints, there can be still errors especially with timing constraints in run-time due to various reasons. Typically, time-critical systems are shipped with run-time monitors to check their temporal requirements. Hence, run-time monitors are essential to time-critical services. In this paper, we propose a model-driven monitor based on AOP for time-critical systems. The monitor is modeled by using xUML in the design time, and its timing constrains are specified by RTL-like expressions. The designed monitor model is transformed into the code automatically by our proposed tool chain. We validate the effectiveness of our approach by presenting a case study and analyzing the implemented system.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132376103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Runtime Verification of Domain-Specific Models of Physical Characteristics in Control Software 控制软件中特定领域物理特性模型的运行时验证
A. D. Roo, Hasan Sözer, M. Aksit
Control logic of embedded systems is nowadays largely implemented in software. Such control software implements, among others, models of physical characteristics, like heat exchange among system components. Due to evolution of system properties and increasing complexity, faults can be left undetected in these models. Therefore, their accuracy must be verified at runtime. Traditional runtime verification techniques that are based on states and/or events in software execution are inadequate in this case. The behavior suggested by models of physical characteristics cannot be mapped to behavioral properties of software. Moreover, implementation in a general-purpose programming language makes these models hard to locate and verify. This paper presents a novel approach to explicitly specify models of physical characteristics using a domain-specific language, to define monitors for inconsistencies by detecting and exploiting redundancy in these models, and to realize these monitors using an aspect-oriented approach. The approach is applied to two industrial case studies.
嵌入式系统的控制逻辑目前主要是在软件中实现的。这样的控制软件实现了物理特性的模型,比如系统组件之间的热交换。由于系统特性的演变和复杂性的增加,在这些模型中故障可能无法被检测到。因此,必须在运行时验证它们的准确性。在这种情况下,基于软件执行中的状态和/或事件的传统运行时验证技术是不够的。物理特征模型所暗示的行为不能映射到软件的行为属性。此外,使用通用编程语言实现使得这些模型难以定位和验证。本文提出了一种使用领域特定语言显式指定物理特征模型的新方法,通过检测和利用这些模型中的冗余来定义不一致性监视器,并使用面向方面的方法实现这些监视器。该方法应用于两个工业案例研究。
{"title":"Runtime Verification of Domain-Specific Models of Physical Characteristics in Control Software","authors":"A. D. Roo, Hasan Sözer, M. Aksit","doi":"10.1109/SSIRI.2011.14","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.14","url":null,"abstract":"Control logic of embedded systems is nowadays largely implemented in software. Such control software implements, among others, models of physical characteristics, like heat exchange among system components. Due to evolution of system properties and increasing complexity, faults can be left undetected in these models. Therefore, their accuracy must be verified at runtime. Traditional runtime verification techniques that are based on states and/or events in software execution are inadequate in this case. The behavior suggested by models of physical characteristics cannot be mapped to behavioral properties of software. Moreover, implementation in a general-purpose programming language makes these models hard to locate and verify. This paper presents a novel approach to explicitly specify models of physical characteristics using a domain-specific language, to define monitors for inconsistencies by detecting and exploiting redundancy in these models, and to realize these monitors using an aspect-oriented approach. The approach is applied to two industrial case studies.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121435341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Using Partial Ordered Numbers to Control Information Flows 使用偏序数控制信息流
S. Chou
Information flow control models can be applied widely. This paper discusses only the models preventing information leakage during program execution. In the prevention, an information flow control model dynamically monitors statements that will cause information flows and ban statements that may cause leakage. We involved in the research of information flow control for years and identified that sensitive information may be leaked only when it is output. However, most existing models ignore information flows induced by output statements. We thus designed a new model that especially emphasizes the monitoring of output statements. We also designed the model as a precise and low runtime overhead one. Our experiments show that the model bans every non-secure information flow and substantially reduces runtime overhead when comparing with our previous work.
信息流控制模型具有广泛的应用前景。本文只讨论了在程序执行过程中防止信息泄漏的模型。在预防中,信息流控制模型动态监控导致信息流的语句,禁止可能导致泄漏的语句。我们从事信息流控制研究多年,发现敏感信息只有在输出时才有可能泄露。然而,大多数现有模型忽略了由输出语句引起的信息流。因此,我们设计了一个特别强调监视输出语句的新模型。我们还设计了一个精确和低运行时开销的模型。我们的实验表明,与我们以前的工作相比,该模型禁止了所有不安全的信息流,并且大大减少了运行时开销。
{"title":"Using Partial Ordered Numbers to Control Information Flows","authors":"S. Chou","doi":"10.1109/SSIRI.2011.27","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.27","url":null,"abstract":"Information flow control models can be applied widely. This paper discusses only the models preventing information leakage during program execution. In the prevention, an information flow control model dynamically monitors statements that will cause information flows and ban statements that may cause leakage. We involved in the research of information flow control for years and identified that sensitive information may be leaked only when it is output. However, most existing models ignore information flows induced by output statements. We thus designed a new model that especially emphasizes the monitoring of output statements. We also designed the model as a precise and low runtime overhead one. Our experiments show that the model bans every non-secure information flow and substantially reduces runtime overhead when comparing with our previous work.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"411 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116195230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 Fifth International Conference on Secure Software Integration and Reliability Improvement
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1